CIPHERTEXT

作品数:48被引量:86H指数:6
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:董庆宽陈丹陈原更多>>
相关机构:西安电子科技大学南京航空航天大学电子科技大学更多>>
相关期刊:《Opto-Electronic Advances》《Journal of Information Security》《Computer Systems Science & Engineering》《China Communications》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Science China(Information Sciences)x
条 记 录,以下是1-8
视图:
排序:
Witness encryption with updatable ciphertexts
《Science China(Information Sciences)》2025年第3期177-192,共16页Yuzhu WANG Mingwu ZHANG 
supported in part by National Natural Science Foundation of China(Grant Nos.62072134,62472150,U2001205);Major Research Plan of Hubei Province(Grant No.2023BAA027);Key Research and Development Program of Hubei Province(Grant No.2021BEA163)。
Witness encryption(WE)is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance.Anyone who possesses a solution to this instance(i.e.,a witness)can then recover the message f...
关键词:witness encryption NP relation updatable ciphertext access control indistinguishable obfuscation 
A survey on cryptographic techniques for protecting big data security:present and forthcoming被引量:6
《Science China(Information Sciences)》2022年第10期69-102,共34页Siqi LU Jianhua ZHENG Zhenfu CAO Yongjuan WANG Chunxiang GU 
supported by National Key Research and Development Project(Grant No.2020YFA0712300);National Natural Science Foundation of China(Grants Nos.61772548,61632012);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-17-001);Peng Cheng Laboratory Project of Guangdong Province(Grant No.PCL2018KP004)。
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world.As they significantly create economic and social value,big data meaningfully impact t...
关键词:big data security cryptographic techniques ciphertext-based data sharing and computing authenticated encryption functional encryption homomorphic encryption secure multi-party computing 
Ciphertext-only fault analysis of GIFT lightweight cryptosystem
《Science China(Information Sciences)》2022年第3期259-261,共3页Wei LI Shan CAO Dawu GU Jiayao LI Tianpei CAI Menglin WANG Li SUN Zhiqiang LIU Ya LIU 
supported by National Natural Science Foundation of China (Grant Nos. 61772129, 61672347);National Cryptography Development Fund (Grant Nos. MMJJ20180101, MMJJ20180202);Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK201703);Shanghai Sailing Program (Grant No. 17YF1405500);Graduate Student Innovation Fund of Donghua University (Grant No. GSIF-DH-M-2019013)。
Dear editor,The GIFT cryptosystem was proposed by Banik et al. [1]in CHES 2017. It can be widely applied to protect RFID tags and other low-resource devices. It has an SPN structure with a fixed 128-bit key size and t...
关键词:EDITOR fault RFID 
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs被引量:2
《Science China(Information Sciences)》2021年第6期238-239,共2页Zengpeng LI Vishal SHARMA Chunguang MA Chunpeng GE Willy SUSILO 
supported in part by National Natural Science Foundation of China(Grant No.61802214);National Natural Science Foundation of Shandong Province,China(Grant No.ZR2019BF009);Applied Fundamental Research Project of Qingdao(Grant No.19-6-2-6-cg);Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2019BDKFJJ007)。
Dear editor,To maintain the confidentiality of the sensitive data,users tend to encrypt their data under an associated access policy(or attributes)before outsourcing them to the cloud.In the traditional access control...
关键词:POLICY EDITOR CONSTRAINED 
Improved lattice-based CCA2-secure PKE in the standard model被引量:5
《Science China(Information Sciences)》2020年第8期143-164,共22页Jiang ZHANG Yu YU Shuqin FAN Zhenfeng ZHANG 
National Key Research and Development Program of China(Grant Nos.2017YFB0802005,2018YFB0804105);National Natural Science Foundation of China(Grant No.61602046);National Natural Science Foundation of China(Grant Nos.61872236;61572192);National Natural Science Foundation of China(Grant No.U1536205);Young Elite Scientists Sponsorship Program by CAST(Grant No.2016QNRC001);Opening Project of Guangdong Provincial Key Laboratory of Data Security and Privacy Protection(Grant No.2017B030301004);National Cryptography Development Fund(Grant No.MMJJ20170209);Anhui Initiative in Quantum Information Technologies(Grant No.AHY150100);National Key Research and Development Program of China(Grant No.2017YFB0802005);National Key Research and Development Program of China(Grant No.2017YFB0802005);National Natural Science Foundation of China(Grant No.U1536205).
Based on the identity-based encryption(IBE)from lattices by Agrawal et al.(Eurocrypt’10),Micciancio and Peikert(Eurocrypt’12)presented a CCA1-secure public-key encryption(PKE),which has the best known efficiency in ...
关键词:LATTICE public-key encryption chosen ciphertext security standard model 
Ciphertext-only fault analysis on the Midori lightweight cryptosystem被引量:1
《Science China(Information Sciences)》2020年第3期249-251,共3页Wei LI Linfeng LIAO Dawu GU Shan CAO Yixin WU Jiayao LI Zhihong ZHOU Zheng GUO Ya LIU Zhiqiang LIU 
supported by National Natural Science Foundation of China (Grant Nos. 61772129, 61472250, 61672347, 61402288, 61402286, 61572192);Shanghai Natural Science Foundation (Grant Nos. 15ZR1400300, 16ZR1401100);Opening Project of Shanghai Key Laboratory of Integrate Administration Technologies for Information Security (Grant No. AGK201703);Opening Project of Shanghai Key Laboratory of Scalable Computing and Systems;National Cryptography Development Fund (Grant No. MMJJ20180101);Fundamental Research Funds for the Central Universities;Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-17-008)
Dear editor,The Midori lightweight cipher can be applied in the RFID tags and other low-resource devices to protect information on the Internet.This cipher was proposed by Banik et al.and presented at the ASIACRYPT co...
关键词:EDITOR RFID CFA 
Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating被引量:4
《Science China(Information Sciences)》2016年第4期183-198,共16页Zuobin YING Hui LI Jianfeng MA Junwei ZHANG Jiangtao CUI 
supported by National Natural Science Foundation of China (Grant Nos. 61202179, 61173089, 61472298, 61472310, U1405255, 61502248);National High-Tech R&D Program (863) (Grant No. 2015AA016007);SRF for ROCS, SEM and Fundamental Research Funds for the Central Universities
Attribute-Based Encryption(ABE) is a promising new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud. With the help of ABE, the majority of security issue...
关键词:attribute-based encryption ciphertext-policy dynamic policy updating adaptive secure standard model 
Short-ciphertext and BDH-based CCA2 secure certificateless encryption被引量:2
《Science China(Information Sciences)》2010年第10期2005-2015,共11页SUN YinXia & LI Hui 1 Key Lab of Computer Networks and Information Security, Ministry of Education, Xidian University, Xi’an 710071, China 
supported by the National Natural Science Foundation of China (Grant No. 60772136);the National High-Tech Research & Development Program of China (Grant No. 2007AA01Z435);National Key Technologies R & D Program of China during the 9th Five-Year Plan Period (Grants Nos. 2008BAH22B03, 2007BAH08B01);National 111 Program (Grant No. B08038)
Certificateless public key cryptosystem actually belongs to identity based cryptography, with an attractive characteristic that the private key generator does not have access to any user's full private key. Most of t...
关键词:identity based cryptography certificateless encryption bilinear pairing BDH problem twin BDH problem random oracle 
检索报告 对象比较 聚类工具 使用帮助 返回顶部